"Thinking inside the box " Wireless Security

in computer •  7 years ago  (edited)

This is a power-point I threw together that explains the differences of all the different wireless security's. Its good to know the differences I don't care who you are if you use computers then security is something that should be taken seriously.

Screenshot (14).png

Screenshot (15).png

Screenshot (16).png

Screenshot (17).png

Screenshot (18).png

Screenshot (19).png

Screenshot (20).png

Screenshot (21).png

Screenshot (22).png

Screenshot (23).png
Thank you for taking your time to take a look at this! I love to spread knowledge ;)
drawing.png
-RICKYG

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

informative, theoretically which protocols are broken and which aren't?

WEP was created first WPA2 being the most current replacement for all the others. But a lot of people still use WEP which accounts for alot of breaches. SO theoretically WEP is the most broken out of all of them.